Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning

被引:24
作者
Li, Jing [1 ]
Othman, Mohd Shahizan [1 ]
Chen, Hewan [2 ]
Yusuf, Lizawati Mi [1 ]
机构
[1] Univ Technol Malaysia, Johor Baharu, Malaysia
[2] China Jiliang Univ, Hangzhou, Peoples R China
关键词
Internet of Things; IoT; Intrusion detection; Feature selection; Feature extraction; Machine learning; Attack classification; DETECTION MODEL; CLASSIFIER;
D O I
10.1186/s40537-024-00892-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT) devices are widely used but also vulnerable to cyberattacks that can cause security issues. To protect against this, machine learning approaches have been developed for network intrusion detection in IoT. These often use feature reduction techniques like feature selection or extraction before feeding data to models. This helps make detection efficient for real-time needs. This paper thoroughly compares feature extraction and selection for IoT network intrusion detection in machine learning-based attack classification framework. It looks at performance metrics like accuracy, f1-score, and runtime, etc. on the heterogenous IoT dataset named Network TON-IoT using binary and multiclass classification. Overall, feature extraction gives better detection performance than feature selection as the number of features is small. Moreover, extraction shows less feature reduction compared with that of selection, and is less sensitive to changes in the number of features. However, feature selection achieves less model training and inference time compared with its counterpart. Also, more space to improve the accuracy for selection than extraction when the number of features changes. This holds for both binary and multiclass classification. The study provides guidelines for selecting appropriate intrusion detection methods for particular scenarios. Before, the TON-IoT heterogeneous IoT dataset comparison and recommendations were overlooked. Overall, the research presents a thorough comparison of feature reduction techniques for machine learning-driven intrusion detection in IoT networks.
引用
收藏
页数:44
相关论文
共 57 条
  • [1] Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of Features
    Abdulhammed, Razan
    Faezipour, Miad
    Musafer, Hassan
    Abuzneid, Abdelshakour
    [J]. 2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
  • [2] Aggarwal Ashwani Kumar, 2022, WSEAS Transactions on Signal Processing, P60, DOI 10.37394/232014.2022.18.8
  • [3] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [4] A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer
    Alazzam, Hadeel
    Sharieh, Ahmad
    Sabri, Khair Eddin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2020, 148 (148)
  • [5] Almseidin M, 2017, I S INTELL SYST INFO, P277, DOI 10.1109/SISY.2017.8080566
  • [6] Multilayer Perceptron: an Intelligent Model for Classification and Intrusion Detection
    Amato, Flora
    Mazzocca, Nicola
    Vivenzio, Emilio
    Moscato, Francesco
    [J]. 2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 686 - 691
  • [7] Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
    Ambusaidi, Mohammed A.
    He, Xiangjian
    Nanda, Priyadarsi
    Tan, Zhiyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 2986 - 2998
  • [8] Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection
    Aminanto, Muhamad Erza
    Choi, Rakyong
    Tanuwidjaja, Harry Chandra
    Yoo, Paul D.
    Kim, Kwangjo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 621 - 636
  • [9] Mutual information-based feature selection for intrusion detection systems
    Amiri, Fatemeh
    Yousefi, MohammadMahdi Rezaei
    Lucas, Caro
    Shakery, Azadeh
    Yazdani, Nasser
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1184 - 1199
  • [10] Arora K., 2018, Handbook of Research on Advanced Concepts in Real-Time Image and Video Processing, P28, DOI 10.4018/978-1-5225-2848-7.ch002